While the market for IGA tools delivered as on-premises software is mature, intense vendor activity renders many new choices for IGA delivered as a service. Security and risk management leaders responsible for IAM should emphasize future requirements when planning to purchase an IGA solution.

Magic Quadrant for Identity Governance and Administration 2017

Several vendors are accelerating efforts to offer cloud-delivered IGA, improve analytics and align with PAM products. Security and risk management leaders responsible for IAM should be aware of functional differences and trade-offs between on-premises and cloud-delivered IGA and plan accordingly.

Magic Quadrant for Identity Governance and Administration 2016

The IGA market is maturing into an early mainstream phase. IAM and security leaders should take note of emerging requirements around more risk-aware identity approaches and cloud adoption that are causing innovative vendors to integrate analytics with adjacent IT and data security technologies.

The identity and access management market has experienced significant upheaval along with its usual growth over the past two years. What began as two relatively distinct markets, user provisioning and access governance, have merged into a single category of identity governance and administration.

Случайный термин

Dual-factor Authentication — Also called “two-factor” or “strong authentication.” Users must confirm their identity to the computer system by presenting two pieces of identification. The first is usually something the user knows (e.g., a password) and the second is usually something the user has (e.g., a cyber key or security token.)